摘要:
Method and apparatus for trimming the neck of plastic bottles includes means for rapidly rotating a cutting blade around the neck being trimmed while progressively moving the cutting blade through the thickness of the neck. During the cutting, a flat surface of the cutting blade rubs against the newly cut upper neck or finish surface to provide a polished surface therefor.
摘要:
A method of forming a multi-layered dual-polysilicon structure that forms a polysilicon gate prior to formation of an ion implantation barrier and that requires fewer steps, is more economical, and permits fabrication of more compact semiconductor circuits and devices than prior art methods.
摘要:
The capabilities of a cryptographic module are controlled by a crypto configuration control (CCC) register that is initialized by one or more self-signed commands that are preformulated and signed with the digital signature key of the crypto module itself. The crypto module accepts a self-signed command only if the self-signature can be validated using the signature verification key of the module. In one implementation, the final configuration is determined by a single self-signed command. In another implementation, a first self-signed command is used to create an temporary configuration that allows one or more initialization authorities to issue additional commands fixing the final configuration. The self-signed commands are maintained separately from the crypto module and are distributed to the end user either physically or electronically. After the self-signed commands have been created and the secret exponent has been embedded in a particular crypto module, all copies of the secret exponent external to the crypto module are destroyed.
摘要:
An extendible leg protector which includes a lower protective portion for the foot and shin, an upper protective portion for the knee, and two adjustable portions which extend from the lower and upper protective portions, respectively. The adjustable portions are adapted to mate together in a manner that the total length of the protector can be varied.
摘要:
A method and system are disclosed for the implementation of a weakened privacy channel. This is achieved through use of a weakened symmetric cryptographic algorithm called commercial data masking. The masked text is created from clear text at one system and may to transported electronically to another system where the masked text may be unmasked to produce the clear text. The reason to use the commercial data masking algorithm for data privacy is that it is exportable to organizations to which products which contain the Data Encryption Algorithm when used for data privacy are not exportable. In addition, a method and system is disclosed by which the key when used for commercial data masking may be transformed into a key that may be used with the Data Encryption Algorithm.
摘要:
Protection of cryptographic keys is converted between one level of security and another level of security. The one level of security is different from the another level of security, and the another level of security includes the components of the one level of security.
摘要:
A railway service vehicle for transporting material into or wheelchair-bound or injured persons away from train accident sites or tunnels includes a body having a platform. Wheels rotatably connected to the body support the body on first and second rails of a railroad track system for non-self propelled movement of the body. At least one mounting device is connected to the platform. A hold-down member releasably connected to the mounting device restrains a wheelchair supported by the platform. A storage/tool container is supported by the platform. At least one passenger seat is connected to the storage/tool container. Opposed first and second containment members are connected to the platform outboard of the mounting device.
摘要:
A method, an apparatus, a system, and a computer program product is presented for virtualizing trusted platform modules within a data processing system. A virtual trusted platform module along with a virtual endorsement key is created within a physical trusted platform module within the data processing system using a platform signing key of the physical trusted platform module, thereby providing a transitive trust relationship between the virtual trusted platform module and the core root of trust for the trusted platform. The virtual trusted platform module can be uniquely associated with a partition in a partitionable runtime environment within the data processing system.
摘要:
A cipher method for verifying a decryption of an encrypted user data key used to encrypt user data prior to an encryption of the user data key with an encryption key. The cipher method involves a decryption of the encrypted user data key with a decryption key in response to an initiation of a decryption of the encrypted user data with the user data key as decrypted with the description key, a decryption of the verification text with the user data key as decrypted with the decryption key, and a validation/invalidation of a use of the user data key as decrypted with the decryption key to decrypt the encrypted user data in response to a matched/unmatched comparison of the verification text as decrypted with the user data key and an intermixing of a known text and a random text.
摘要:
A system and method provides content to a plurality of kiosks located in establishments for playback at those establishments. The system includes a management server that controls the delivery of the content to the kiosks, and schedules the playback of the content. The kiosks have one or more display screens for playing back the content. The kiosks receive information from the patrons at the establishments and pass this information to the management server. Based on the information collected by the kiosks, targeted content is provided to the kiosks by the management server.